{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:41:16Z","timestamp":1760074876488,"version":"build-2065373602"},"reference-count":60,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185755","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"965-974","source":"Crossref","is-referenced-by-count":0,"title":["The Implementation of Artificial Intelligence Technologies in the Military Domain: Opportunities and Risks"],"prefix":"10.1109","author":[{"given":"Viktoriia","family":"Hurochkina","sequence":"first","affiliation":[{"name":"SGH Warsaw School of Economics,Warsaw,Poland"}]},{"given":"Svitlana","family":"Bondarenko","sequence":"additional","affiliation":[{"name":"SGH Warsaw School of Economics,Warsaw,Poland"}]},{"given":"Tomasz","family":"Szapiro","sequence":"additional","affiliation":[{"name":"SGH Warsaw School of Economics,Warsaw,Poland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/8676366"},{"year":"2023","key":"ref2","article-title":"Gartner top 10 strategic technology trends for 2024"},{"year":"2024","key":"ref3","article-title":"The si index report: Measuring trends in si"},{"year":"2024","key":"ref4","article-title":"Si market size worldwide from 2020-2030"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-021-04049-5"},{"year":"2024","key":"ref6","article-title":"Openai launches new series ai models solve hard problems"},{"key":"ref7","article-title":"Si deepfake attacks will extend beyond videos and audio \u2014 security firms","author":"Reguerra","year":"2024","journal-title":"Cointelegraph"},{"year":"2024","key":"ref8","article-title":"Microsoft, blackrock to launch $30 billion fund for si infrastructure"},{"article-title":"The SIindex report. measuring trends in si","year":"2024","author":"Index","key":"ref9"},{"key":"ref10","article-title":"Ai and emotional data between the scylla and charybdis of european regulation","volume-title":"IRIS2024: Internationales Rechtsinformatik Symposion","author":"Ballardini","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.55643\/fcaptp.6.53.2023.4178"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/13600826.2023.2205444"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2023.2261260"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3989\/arbor.2021.800002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/19475705.2024.2327399"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-019-00879-x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1684\/1\/012147"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780197546048.003.0009"},{"year":"2023","key":"ref19","article-title":"Digital economy outlook 2024: Going digital"},{"issue":"3","key":"ref20","first-page":"1","article-title":"Foreign state economic policy in the context of economic security","volume":"24","author":"Hurochkina","year":"2021","journal-title":"Journal of Management Information and Decision Sciences"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2021.1894136"},{"journal-title":"MIT Technology Review Insights","article-title":"The si arms race: Implications for global security","year":"2024","key":"ref22"},{"issue":"4","key":"ref23","first-page":"524332","article-title":"Thoughts on technology development of ooda empowered with si","volume":"42","author":"Zhu","year":"2021","journal-title":"Hangkong Xuebao\/Acta Aeronautica et Astronautica Sinica"},{"issue":"9","key":"ref24","first-page":"1106","article-title":"Application progress of artificial intelligence in military confrontation","volume":"42","author":"Zhang","year":"2020","journal-title":"Gongcheng Kexue Xuebao\/Chinese Journal of Engineering"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.34190\/eccws.21.1.216"},{"issue":"9","key":"ref26","first-page":"303","article-title":"Intelligent wargame deduction decision method based on deep reinforcement learning","volume":"49","author":"Hu","year":"2023","journal-title":"Jisuanji Gongcheng\/Computer Engineering"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3152768"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/rs14164110"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC45622.2019.8938280"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TechDefense59795.2023.10380835"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/RADAR54928.2023.10371132"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/math11030501"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-39774-5_80"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-8894-5_8"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2022.2073278"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/bioengineering10070807"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3323014"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5604\/01.3001.0053.9857"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1142\/S1793351X24300048"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsse.2023.08.002"},{"issue":"4","key":"ref41","first-page":"12","article-title":"A proposal for the dartmouth summer research project on artificial intelligence, august 31, 1955","volume":"27","author":"McCarthy","year":"2006","journal-title":"AI Magazine"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-65572-2_12"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR61889.2024.10554158"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.21037\/jmai-24-38"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-023-09683-0"},{"year":"2018","key":"ref46","article-title":"Summary of the national defense strategy: Sharpening the american military\u2019s competitive edge"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2024.102484"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s00345-024-05145-4"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad6cad"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TTE.2023.3266734"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.109171"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s42484-024-00179-8"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3314504"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-024-00797-x"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1021\/acs.jcim.3c00285"},{"article-title":"Extracting training data from large language models","year":"2021","author":"Carlini","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121240"},{"article-title":"Training compute-optimal large language models","volume-title":"Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS 2022)","author":"Hoffmann","key":"ref58"},{"article-title":"Learning transferable visual models from natural language supervision","year":"2021","author":"Radford","key":"ref59"},{"article-title":"When does label smoothing help\u0192","year":"2020","author":"M\u00fcller","key":"ref60"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185755.pdf?arnumber=11185755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:04:43Z","timestamp":1760072683000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185755","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}